Akamai, CISA, and CIS Join Forces to Improve SLTT Cyber Defenses

Akamai, CISA, and CIS Join Forces to Improve SLTT Cyber Defenses

Cybercriminals continue to target U.S. state, local, tribal, and territorial (SLTT) government organizations. In 2019, there were more than 100 ransomware attacks -- including an attack on Baltimore's IT systems that locked out thousands of computers and disrupted nearly every city service. This attack is estimated to have cost the ... Read More
Enterprise Threat Protector Now Includes One-Click Performance Optimization for Microsoft 365

Enterprise Threat Protector Now Includes One-Click Performance Optimization for Microsoft 365

Microsoft 365 is becoming the essential productivity suite for enterprises. Over 1 million companies have now signed up for the service, and every month there are more than 200 million active users. Microsoft Teams alone has 75 million active users every day ... Read More
Tale of the Tape: Top 5 Reasons Phishing Attacks Haven't Dried Up

Tale of the Tape: Top 5 Reasons Phishing Attacks Haven’t Dried Up

One of my favourite websites is archive.org (OK, so I'm a nerd). For anyone not familiar with this website, it's essentially a time machine that allows you to go back and look at pretty much any site from a point in time over the past 20-odd years ... Read More
The Children's Internet Protection Act (CIPA)

The Children’s Internet Protection Act (CIPA)

Enacted in 2000 by the United States Congress, the Children's Internet Protection Act (CIPA) limits children's exposure to explicit internet material such as obscene content. CIPA mandates that K-12 schools and public libraries must deploy technologies that filter this type of content on internet-connected computers in order to be eligible ... Read More
Simplifying Data Center and IaaS Visibility and Protection

Simplifying Data Center and IaaS Visibility and Protection

Helping customers further secure their on-premises data centers and IaaS deployments is an interesting new use case for our Enterprise Threat Protector service ... Read More
COVID-19 and the Perfect Security Storm

COVID-19 and the Perfect Security Storm

| | Cloud Security
The global pandemic has resulted in a dramatic shift to home working. This has created a perfect security storm that has dramatically increased the security risk for enterprises. The best worst-case scenario is that a single device used by an ... Read More
Business Continuity and Security in an Uncertain Global Environment

Business Continuity and Security in an Uncertain Global Environment

The need for companies to quickly enable remote access to business-critical applications was highlighted in a recent Akamai blog -- Enabling Business Continuity in an Uncertain Global Environment ... Read More
Akamai Enhances Enterprise Threat Protector to Add Secure Web Gateway Capabilities

Akamai Enhances Enterprise Threat Protector to Add Secure Web Gateway Capabilities

Today, Akamai announced that it has added secure web gateway (SWG) capabilities to its Enterprise Threat Protector (ETP) service to help enterprises further accelerate their transformation to a Zero Trust security architecture. So what are the SWG enhancements and what ... Read More
tlstlsone.png

Inspecting TLS Web Traffic – Part 3

| | Enterprise Threat Protector
In the second part of this blog, I covered how HTTPS web content inspection is provided in Akamai's Enterprise Threat Protector (ETP) service using ETP proxy. In this final blog post I want to provide information about how Akamai generates, ... Read More
tlsone.png

Inspecting TLS Web Traffic – Part 2

| | Enterprise Threat Protector
In the first blog post I covered why HTTPS web traffic has grown to unprecedented levels, provided a TLS primer and looked at the basic concept of intercepting and inspecting HTTPS web traffic with Man-In-The-Middle techniques (MITM). In the second ... Read More